Below is a selection of recommended products:
Audio
Hacking with Kali Linux: 2020 Edition: Practical Guide to Computer Network Hacking, Encryption, Cybersecurity, Penetration Testing for Beginners. The Secrets of VPN Services, Firewalls and the Linux Command Line.
The Principles of Cybersecurity and Hacking: 5 Books in 1: Cybersecurity and Hacking Series
Think Like a Hacker: A Sysadmin’s Guide to Cybersecurity
Books
Ethical Hacking For Beginners: The Practical Guide to Computer Hacking to Learn and Understand the Concept of Ethical Hacking
HACKING!: This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX
Linux for Hackers: A Complete Step-by-Step Guide to Hacking Wireless Network Security and Server Database with Technology Ecosystem Linux
Hardware
Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter w/2x 5dBi External Antennas – 2.4GHz 300Mbps/5GHz 867Mbps – 802.11ac & A, B, G, N
CanaKit Raspberry Pi 4 4GB Starter Kit – 4GB RAM
Hak5 USB Rubber Ducky Deluxe Field Guide Book
HDMI Dummy Plug,Headless Ghost, Display Emulator (Fit Headless-1920×1080 New Generation@60Hz)
Panda Wireless PAU06 300Mbps Wireless N USB Adapter – w/High Gain Antenna – Win XP/Vista/7/8/10, Mint, Ubuntu, MX Linux, Manjaro, Fedora, Centos, Kali Linux and Raspbian
UGREEN Mini HDMI Adapter Mini HDMI to HDMI Female Cable Adapter 4K Compatible for Raspberry Pi Zero W, DSLR Camera, Camcorder, Graphics Video Card, Laptop, Pico Projector, Tablet, 8 Inch
(Upgraded)Rii 2.4GHz Mini Wireless Keyboard with Touchpad,QWERTY Keyboard,LED Backlit,Portable Keyboard Wireless for laptop/PC/Tablets/Windows/Mac/TV/Xbox/PS3/Raspberry Pi .(i8+ Black)
USB C Fast Battery Pack Charger, Baseus Portable Power Bank 30000mAh, 3 Output Port Charger for iPhone 11 Pro Max, Samsung S20, Android Phones, iPad, Nintendo Switch
Vilros Raspberry Pi Zero W Basic Starter Kit- Black Case Edition-Includes Pi Zero W -Power Supply & Premium Black Case
Videos
Identity Theft – Protect Your Online Identity, 10 Simple steps to Protect Your Online Identity
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare